Mainebiz

August 24, 2015

Issue link: https://nebusinessmedia.uberflip.com/i/558749

Contents of this Issue

Navigation

Page 21 of 31

V O L . X X I N O. X I X A U G U S T 2 4 , 2 0 1 5 22 T E C H N O L O G Y F O C U S Cyber defenses Cybersecurity solutions comprise a number of specialties such as penetra- tion testing, information assurance and digital forensics. Penetration testing involves breaking into a protected net- work in order to identify the network's weaknesses, which can then be fi xed. Information assurance involves pro- tecting data release and data integrity. Sihler posits the question: Is a shopping website real, or is it a clone concocted by a cyber bad guy who takes your credit card info? is issue is related to the fi eld of encryption and the eff ort to keep encrypted data safe from prying eyes. Digital forensics investigates the source of break-ins. "Somebody's broken in. Now what?" Sihler says. "What's the fl aw, how did they get in and how do we close it? What did they touch, take, alter and add?" e goal, he says, is to understand the scope and ramifi cations of an attack — who needs to be told their credit card or social security number has been viewed — with an eye to preventing the next attack and fi nding evidence for criminal prosecution. is area, he says, overlaps with the type of traditional police work involved, for example, in recovering emails from a hard drive that were erased to hide a crime. MCSC is also charged with public outreach and conducts classes and presentations in the lab and in the fi eld around the state. "It's raising awareness at the broadest level," Sihler says. In contrast to cybersecurity fi rms which, he says, tend to be secretive by nature, "one of the nice things about being part of the university is that we are here to talk. We spend a lot of time going out to anybody who wants to listen, and we say, 'Here is why you need to worry about changing your password. Here's why you need to worry about that phishing email.' We also explain how things are done. For example, after just about every large hack, someone from here will end up on multiple media outlets being the talking head who explains how it was done." MCSC operations are partly funded by the Maine Economic Improvement Fund and other grants. In June, MCSC received another round of funding from the Maine Technology Institute's Cluster Initiative Program in the amount of $496,174, plus $2.1 million in matching funds for the purpose of pursuing partnerships with business, government and academic institutions. As a training facility and a resource for outside users, MCSC has great potential, says Sihler. With the comple- tion of the spring 2014 semester, all seven graduates found immediate employ- ment with local businesses. MCSC's capacity for enrollment for fall is about 21 students. So far, 12 have enrolled; it's expected more will sign on through the school year. Since MCSC doesn't off er classes, per se, it's not tied to the semester enrollment schedule. So far, MCSC has performed tests for local, state and federal government agencies, as well as the private sector, primarily in IT, insurance and pharma- ceuticals. It is also conducting a series of workshops for the Coast Guard on the nature of cyber attacks. MCSC is in the process of reaching out to Maine's small- and mid-sized businesses, in areas such as credit card security. It's a delicate balance, he says: As part of a public institution, MCSC is required by law to avoid competing with fi rms that off er cybersecurity services. So MCSC focuses on raising conscious- ness about the need for cybersecurity, running classes and research and test- ing of new gear in partnership with commercial entities. "In the best of all worlds, from the USM standpoint, we'd talk to small businesses, get them interested, then say, 'Here's a student who will work with you,'" Sihler says. "So the student gets an internship out of it, the cyber- security fi rm makes money out of it, and the business gets a good product at a reduced price, because it's student labor. e end result is the state of Maine gets a graduate who is hired, stays in Maine and continues to work in the technology fi eld meeting the shortage of skilled technology profes- sionals we have in the Maine economy and the national economy as well." L a U r i e S C H r e i b e r , a w r i t e r b a s e d i n B a s s H a r b o r, c a n b e r e a c h e d a t e D i T o r i a l @ m a i n e b i z . b i z » C O N T I N U E D F RO M P R E V I O U S PA G E Hosted PBX Phone Systems | Hosted File Sharing, Backup , Backup , and Recovery | Access to New Fiber Ne r Ne r tw tw t orks an and more… Leverage your broadband. Imagine the possibilities. Broadband is just the beginning. Save time, save money and say goodbye to costly capital investment by leveraging the broadband you already have. We'll show you how. toll free: 866 494 2020 | www.gwi.net In the best of all In the best of all In the best of all In the best of all In the best of all In the best of all In the best of all In the best of all In the best of all worlds, from the USM worlds, from the USM worlds, from the USM worlds, from the USM worlds, from the USM worlds, from the USM worlds, from the USM worlds, from the USM worlds, from the USM worlds, from the USM worlds, from the USM worlds, from the USM worlds, from the USM standpoint, we'd talk to small businesses, get them interested, then say, 'Here's a student who will work with you.' — Edward Sihler, Maine Cyber Security Cluster, University of Southern Maine

Articles in this issue

Links on this page

Archives of this issue

view archives of Mainebiz - August 24, 2015